The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Search-based software testing has achieved great attention recently, but the efficiency is still the bottleneck of it. This paper focuses on improving the efficiency of generating test data for multiple paths. Genetic algorithms are chosen as the heuristic algorithms in search-based software testing in this paper. First, we propose an improved grouping strategy of target paths to balance the load...
In this paper, we build a testbed with quadrotors for formation flight research. The hardware and software as well as a simulation platform are implemented and illustrated. An identification experiment is taken to obtain the dynamic model of our quadrotor. Using the identification dynamic model, we develop a position control algorithm. A group with two quadrotors to achieve formation flight are given...
The Software Defined Network (SDN) is a new networking paradigm, which separates the control plane and data plane. In this paper, we study two efficient large flow scheduling problems using SDN. We firstly present problem definitions, then we propose two algorithms based on Minimize-Cost Maximize-Flow (MCMF) model. One is for static model and the other for dynamic model. We show how to determine the...
In order to improve the efficiency of software test case execution, this paper analyzed the impact of some factors to test cases prioritization and presented two adjustment algorithms. These factors included software requirement prioritization, software failure severity and software failure probability level. Firstly, gave the definition of software requirement prioritization, the ranking methods...
This paper proposes a new dynamic program slicing algorithm taking the advantage of the dynamic program slice technology nowadays. This algorithm uses abstract machine to ascertain the track of program execution, and uses the dependence relations of program statements to cut the program into slices. We compare our program slicing algorithm to others, the analyzable results show that our algorithm...
Hardware/software partitioning is a crucial problem in hardware/software co-design. In this paper, we deeply investigate genetic algorithm (GA) for hardware/software partitioning, our co-design targets a heterogeneous multicore system on chip (SoC) which consists of several different types of processing engines(PE), Communicating structure adopts NOC, We use GA for four task graphs to simulate the...
Ant colony algorithm is a new algorithm of heuristic bionic calculation. Now, it has been widely applied in many fields of combinatorial optimization. This paper elaborates the basic principle and mathematical model of typical ant colony algorithm for solving the traveling salesman problem, and analyzes impact of the optimal parameters to the performance of algorithm. Based on its shortages, an improved...
Test suite augmentation techniques are used in regression testing to identify code elements affected by changes and to generate test cases to cover those elements. Whereas methods and techniques to find affected elements have been extensively researched in regression testing, how to generate new test cases to cover these elements cost-effectively has rarely been studied. It is known that generating...
In the Internet age, Software security and piracy becomes a more and more important issue. In order to prevent software from piracy and unauthorized modification, various techniques have been developed. Among them is software watermarking which protects software through embedding some secret information into software as an identifier of the ownership of copyright for this software. This paper gives...
This paper is dedicated to the study of Symbolic Execution and improves the core algorithm of it using Heuristic learning, search and Function Abstraction to effectively address the path explosion problem, which will trigger the vulnerabilities that the traditional method can not find and improve the efficiency, precision and accuracy of software vulnerability discovery.
Hardware/Software partitioning is one of the critical steps in Hardware/Software Co-Design flow, and has very important influence on the system performance. Hardware/Software partitioning is also a NP-hard problem. In this paper, we present a new Hardware/Software partitioning algorithm called PSO-IC for heterogeneous multicore SOC, which combines particle swarm optimization (PSO) algorithm and immune...
To capture a dynamic system with static reduction algorithm, the cost will enlarge a lot for the repeated work. Moreover, the algorithm can not catch partial changes in the system. To smooth this issue, a dynamic attribute reduction algorithm is introduced when the universe of the system keeps the same and the condition attribute set is added. The concept, Flagged Matrix, K-Flagged Matrix and Σ-Flagged...
This paper has made a thorough analysis of brushless DC motor simulation system, in which we use a single neuron PID control algorithm based on RBF neural network for on-line identification (RBF-PID Algorithm). A special human-computer interaction (HCI) interface was designed in this paper, which provides interface for users to set the correlative parameters and select related control algorithm. Two...
In this paper we indicate the concept of dynamic data flow graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds watermarking information into DDFG of software, and discuss the implementation of embedding and extracting watermark. Finally we analyze the performance of this algorithm.
In traditional dynamic binary translation (DBT) systems, poor profile information at runtime limits the manner of optimization. Combining dynamic binary translation with static analysis brings an opportunity to improve the runtime performance. Once the source image has been executed, the profile information and target code will be saved, which are available at next runs. Moreover, optimizations will...
In view of that the two-dimensional chaotic sequence only holds a low limited-accuracy, as well as the linear complexity of linear feedback shift register generated-sequence is limited, also the generated-sequence is easily decoded. This paper proposes one kind of the two-dimensional mix chaos algorithm for image encryption based on uniting the ultra-chaos switch system and the linear feedback shift...
This paper introduced several abstract algorithms and analysed the existed problem, which the keyword's position was not enough considered in Lucene software package. Then this paper developed the dynamic abstract algorithm in Lucene software package. The new algorithm referred to the keyword's position in the content. The new abstract is exact. By testing, the developed algorithm is more effective.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.